• Title/Summary/Keyword: defense industry

Search Result 3,308, Processing Time 0.029 seconds

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

Bovine leukocyte adhesion deficiency

  • Kehrli, Marcus E. Jr.;Park, Yong-ho;Yoo, Han-sang
    • Korean Journal of Veterinary Research
    • /
    • v.39 no.2
    • /
    • pp.247-256
    • /
    • 1999
  • A disease of young Holstein calves characterized by recurrent pneumonia, ulcerative and granulomatous stomatitis, enteritis with bacterial overgrowth, periodontitis, delayed wound healing, persistent neutrophilia and death at an early age had been originally described in 1983 and again in 1987. Most of these calves had stunted growth and a persistent, progressive neutrophilia (often exceeding 100,000/ml). By investigation of pedigrees, all of the affected calves have now been traced to a common sire and confirmed by polymerase chain reaction (PCR) diagnostic DNA testing to be homozygous carriers of a defective allele for bovine CD18. Neutrophils from these calves have several functional deficits and, most importantly, fail to adhere in a ${\beta}_2$-integrin dependent manner. The ${\beta}_2$-integrins represent a family of glycoproteins which participate in various leukocyte adhesion reactions during host defense. The presence or absence of ${\beta}_2$-integrin molecules can be demonstrated on the surface of neutrophils, monocytes and lymphocytes from normal or affected calves using specific monoclonal antibodies and flow cytometry, or by colloidal gold immunolabeling and scanning electron microscopy in backscatter mode. Deficiency of the ${\beta}_2$-integrins on all leukocyte types in Holstein calves is analogous to leukocyte adhesion deficiency (LAD) seen in humans. Neutrophils in bovine (BLAD) and human LAD patients are unable to adhere to the endothelial lining of the cardiovascular system thus interrupting egression of neutrophils into infected tissues. Other leukocytes, while still deficient in expression of the ${\beta}_2$-integrins, are still able to efficiently egress from the blood stream due to interactions of other adhesion molecules that are not as highly expressed on neutrophils. Both BLAD cattle and LAD children (who do not receive bone marrow transplants) often die at an early age as a result of the failure of neutrophils to extravasate into infected tissues. In 1991, Shuster, et $al^{27}$, identified two point mutations within the alleles encoding bovine CD18 in a Holstein calf afflicted with leukocyte adhesion deficiency. One mutation causes an aspartic acid to glycine substitution at amino acid 128 (D128G) in an extracellular region of this adhesion glycoprotein that is highly conserved (> 95% identity) between humans, cattle and mice. The other mutation is silent. Numerous calves with clinical symptoms of leukocyte adhesion deficiency have since been tested and all have been found homozygous for the D128G allele. In addition, calves homozygous far the D128G allele have been identified during widespread DNA testing in the United States. All cattle with the mutant allele are related to one bull, who through artificial insemination (A.I.), sired many calves in the 1950's and 1960's. The carrier frequency of the D128G CD18 allele among U.S. Holstein cattle had reached approximately 15% among active A.I. bulls and 8% among cows. By 1993, the organization of the dairy industry and the diagnostic test developed to genotype cattle, enabled virtually complete eradication of bovine leukocyte adhesion deficiency among current and future A.I. bulls.

  • PDF

Mode of Action of Antimicrobial Peptides Identified from Insects (곤충 유래 항균 펩타이드의 작용 기작)

  • Lee, Heejeong;Lee, Dong Gun
    • Journal of Life Science
    • /
    • v.25 no.6
    • /
    • pp.715-723
    • /
    • 2015
  • Insects represent the largest class within the animal kingdom in terms of species number. Humans had been utilized insect in the broad area, including food, agriculture, industry, pharmaceuticals and so on. At present, insects are emerging as a leading group for identifying and extracting novel bioactive substances due to enormous number and a high nutritional value. Insects rely on a suite of systemic response to resist infection such as immune cells, hemocytes, activation of enzymes cascades, and antimicrobial peptide/protein. Among the substances, antimicrobial peptides (AMPs) are main components of potent antimircrobial innate defense system into the insect hemolymph. AMPs raise influential candidate as avenue to resolve the development of antibiotic-resistant microbial organism. Insect AMPs are classified into four main classes: cecropins, insect defensins, glycine/proline-rich peptides. Insect AMPs have been purified, over 150. In this review, AMPs derived from several insects were summarized including honey bee, dung beetle, butterfly and longicorn beetle. These peptides almost exhibited potent antimicrobial activities against human microbial pathogens without causing remarkable hemolysis to erythrocytes excluding melittin, and their mode of action(s) are based on disruption of the plasma membrane or fungal apoptosis. Therefore, study of insect AMPs is expected to be useful for designing novel therapeutic antimicrobial applications.

An Integration of Legacy Nuclear Simulation Code into HLA Federation using Shared Memory (공유메모리를 사용한 레거시 원자력 시뮬레이션 코드의 HLA 패더레이션으로의 통합)

  • Park Geun-Ok;Han Kwan-Ho;Lim Jong-Tae
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.797-806
    • /
    • 2005
  • The objective of the In-h(High Level Architecture) have recommended by DoD(Department of Defense) is to facilitate interoperability among simulations and to promote reuse of their components. There are many legacy simulation softwares developed before the HLA becomes simulation standard. The integration of legacy simulations into federations using the HLA is an important research topic in M&S(Modeling and Simulation) area. Legacy simulation softwares of the mission critical industry such as nuclear and aerospace are generally use Fortran language. However, the reuse of those is not easy because the HLA is not support Fortran language. This paper suggests a integration method which minimizes the modification of legacy simulation software and migrates the legacy simulation software to HLA federation. Each federate participating in federation have the separated executables that communicate via a shared memory created at run-time. Two types of shared memory blocks are used for publication and subscription. Declaration block for global variables used in legacy simulation software is separated for publication and subscription and then mapped as classes of objects and interactions for the HLA FOM design. To validate the suggested method, we approached the HLA integration of legacy nuclear simulation code being used in plant design and to observe the integration results, we used the FMT(Federation Management Tool). The diagnostic information which the FTM displays showed that our method can be successfully and effectively used for a HLA federation.

Review of the Revised 2019 Trade Secret Protection Act and Industrial Technology Protection Act : Focusing on Civil and Criminal Remedies (2019년 개정 영업비밀보호법 및 산업기술보호법에 대한 검토: 민·형사적 구제를 중심으로)

  • Cho, Yongsun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.333-352
    • /
    • 2019
  • In January and August 2019, there were amendments to the Unfair Competition and Trade Secrets Protection Act (UCPA) and the Industrial Technology Protection Act(ITPA). These amendments will contribute to technology protection. But these amendments need to be supplemented further. In the area of civil remedies, despite the introduction of treble damages in the case of the UCPA and ITPA, the provisions related to the submission of supporting data have not been maintained. Therefore, it is necessary to recognize the claim of the other party as true if it is maintained at the level of the revised Patent Act and the scope of submission of supporting data. And the enforcement of the case of compulsory submission for the calculation of damages, and the order of filing documents are not followed. ITPA, on the other hand, has introduced the compensation for damages, but there is no provision for estimating the amount of damages. Therefore, it is necessary to estimate the amount of lost profits, profits, and royalties. In the area of criminal remedies, both the UCPA and ITPA have raised the penalty, but the sentencing regulations are not maintained. In addition, although the recent outflow of technology has expanded beyond organizational deviations to organizational outflows, amendments need to be made in relation to the serious consequence for the punishment of related juristic persons, such as companies involved in it. It should be noted that Japan and the United States have corporate regulations and regulations. In addition, in relation to the confiscation system, Act on Regulation and Punishment of criminal proceeds concealment require that domestic defenses be confiscated by defense industry technology, while trade secrets and industrial technologies are confiscated only by "foreign" outflows, and an amendment is necessary.

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

A Study on the Methodology for Combat Experimental Testing of Future Infantry Units using Simulation (시뮬레이션을 활용한 미래 보병부대 전투실험)

  • Lim, Jong-Won;Choi, Bong-Wan;Yim, Dong-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • Owing to the development of science technology, particularly the smart concept and defense policy factors of the 4th industry, military weapon systems are advanced, and the scientific and operational force is reduced dramatically. The aspect of the future war is characterized by the operation of troops with reduced forces from advanced and scientific weapon systems in an operational area that has expanded more than four times compared to the present. Reflecting on these situational factors, it is necessary to improve combat methods based on the changes in the battlefield environment and advanced weapon systems. In this study, to find a more efficient future combat method in a changing war pattern, this study applied the battle experiment methodology using Vision21 war game model, which is an analytical model used by the army. Finally, this study aimed to verify the future combat method and unit structure. Therefore, the scenario composition and experiment method that reflect the change in the ground operational environment and weapon system was first composed. Subsequently, an analysis method based on the combat effectiveness was applied to verify the effective combat performance method and unit structure of future infantry units.

Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology (인공지능기술의 IoT 통합보안관제를 위한 데이터모델링)

  • Oh, Young-Taek;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.57-65
    • /
    • 2021
  • A hyper-connected intelligence information society is emerging that creates new value by converging IoT, AI, and Bigdata, which are new technologies of the fourth industrial revolution, in all industrial fields. Everything is connected to the network and data is exploding, and artificial intelligence can learn on its own and even intellectual judgment functions are possible. In particular, the Internet of Things provides a new communication environment that can be connected to anything, anytime, anywhere, enabling super-connections where everything is connected. Artificial intelligence technology is implemented so that computers can execute human perceptions, learning, reasoning, and natural language processing. Artificial intelligence is developing advanced technologies such as machine learning, deep learning, natural language processing, voice recognition, and visual recognition, and includes software, machine learning, and cloud technologies specialized in various applications such as safety, medical, defense, finance, and welfare. Through this, it is utilized in various fields throughout the industry to provide human convenience and new values. However, on the contrary, it is time to respond as intelligent and sophisticated cyber threats are increasing and accompanied by potential adverse functions such as securing the technical safety of new technologies. In this paper, we propose a new data modeling method to enable IoT integrated security control by utilizing artificial intelligence technology as a way to solve these adverse functions.

A phenomenological study on the dream insight process of intern counselor -Based on Dream Integrated Art Therapy- (인턴상담자의 꿈 통찰 과정에 관한 현상학적 연구 -꿈통합예술치료를 기반으로-)

  • Kwon, Hye-Jin;Shin, Dong-Yeol
    • Industry Promotion Research
    • /
    • v.7 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • This study is a phenomenological study on the dream insight process of intern counselors. The purpose of this study is to promote growth as a professional counselor based on the process of giving meaning to and recognizing their experiences through insight into the unconscious. Therefore, we used dream-integrated art therapy to have a process of recognizing unconscious dreams that clearly express expectations for oneself, others, and the world, and to explore this process more flexibly. The research participants selected three students enrolled in the master's and doctor's courses from among the applicants who applied through public relations and adopted the phenomenological Giorgi research method for data collection and analysis through in-depth interviews with the research participants. The main research results are as First, the intern counselors had a motive for wanting their own unconscious insight through dream-integrated art therapy and were able to gain insight into the problems revealed in their unconscious through dreams, music, and art media. Second, it was found that the intern counselors felt a deepening of concentration and comfort through recent dreams, music, and art media in common. Third, as a defense mechanism that was revealed without the combination of dream integrated art therapy, the avoidance tendency of not wanting to reveal oneself was common, but this showed a gradual decrease. Fourth, it was reported that intern counselors gained flexibility for themselves about the future growth direction had an opportunity to accept themselves, and had a plan for the future direction to become professional counselors. Therefore, it is suggested that follow-up studies using various media, studies to verify the effectiveness of the dream integration program, and various case studies are necessary.